Acceptable Use Policy

Access and use

Access to some University computer systems requires that each user have a unique identity,
protected by a password. A computer identity represents the user in various system
activities, to provide access to software and data, and to associate the user's own
software and data with the identity. As such, this computer identity is a University
instrument of identification, and its misuse constitutes forgery or misrepresentation
and is subject to University disciplinary action.

In particular:

No Webster system is to be used for any illegal or criminal purpose.

Unauthorized attempts to gain root access or access to any account not belonging to
the user on any Webster system are prohibited.

Unauthorized access to restricted databases is prohibited.

Any user who finds a possible security hole on any Webster system is obliged to report
it to the system administrators.

Password sharing is prohibited. Users shall be held responsible for choosing safe
passwords, ensuring file protections are set correctly, and for all use of accounts
and user-ids assigned to them.

Civility and liberty

The University seeks to protect the civil, personal, and property rights of those
actually using its computing resources and seeks to protect the confidentiality of
University records stored on its computer systems. Conduct which involves use of University
computer resources to violate another's rights is subject to University disciplinary
action.

As an academic institution, we are committed to supporting the academic freedom of
all members of the University community; as a social institution, we are committed
to respecting the dignity of all members of our community. The standards and principles
of intellectual and academic freedom developed for university libraries apply to material
received via computer news networks and by similar means. The standards of intellectual
and academic freedom developed for faculty and student publication in traditional
media apply to computer-mediated publication.

There will be situations in which what one person understands to be free expression
another person takes to be harassment, personal assault, or an assault on prevailing
standards of decency. The Report of the Committee on Freedom of Expression at Yale
University (January 8, 1975), states:

Shock, hurt, and anger are not consequences to be weighed lightly. No member of a
community with a decent respect for others should use, or encourage others to use,
slurs and epithets intended to discredit another's race, ethnic group, religion, or
sex. It may sometimes be necessary in a university for civility and mutual respect
to be superseded by the need to guarantee free expression. The values superseded are
nevertheless important, and every member of the university community should consider
them in exercising the fundamental right to free expression.

We have considered the opposing argument that behavior which violates these social
and ethical considerations should be made subject to formal sanctions, and the argument
that such behavior entitles others to prevent speech they might regard as offensive.
Our conviction that the central purpose of the university is to foster the free access
of knowledge compels us to reject both of these arguments. They assert a right to
prevent free expression. They rest upon the assumption that speech can be suppressed
by anyone who deems it false or offensive. . . . . They make the majority, or any
willful minority, the arbiters of truth for all. If expression may be prevented, censored,
or punished, because of its content or because of the motives attributed to those
who promote it, then it is no longer free. It will be subordinated to other values
that we believe to be of lower priority in a university.

The conclusions that we draw, then, are these: even when some members of the university
community fail to meet their social and ethical responsibilities, the paramount obligation
of the university is to protect their right to free expression. . . . If a university's
overriding commitment to free expression is to be sustained, secondary social and
ethical responsibilities must be left to the informal processes of suasion, example,
and argument.

Just as nothing in the present policy is to be understood as excusing users of University
computing facilities from compliance with federal or state law, nothing in this policy
should be understood as withdrawing the University's affirmation of statements in
faculty and student policy handbooks in support of academic and intellectual freedom.

None of this, though, denies that harassment on the basis of sex is a violation of
Section 703 of Title VII of The Civil Rights Act of 1964 and is also prohibited under
Title IX of the Education Amendments of 1972. Webster University's Sexual Offense
Policy defines sexual harassment (following Section 703 and the EEOC's 1980 Sex Discrimination
Guidelines):

Unwelcome sexual advances, requests for sexual favors, and other verbal or physical
contact of a sexual nature constitutes sexual harassment when 1) submission to such
conduct is made either explicitly or implicitly a term or a condition of an individual's
employment or education or 2) submission to or rejection of such conduct is used as
a basis for employment or academic decisions affecting that individual or 3) such
conduct has the purpose or effect of unreasonably interfering with an individual's
work or academic performance or of creating an intimidating, hostile, or offensive
educational or employment environment.

The mere fact of computer-mediation by no means excuses contact that otherwise counts
as sexual harassment under the reasonable person standard adopted by the University.
Furthermore, users of public terminals or similar facilities at the University should
be aware of the public nature of shared facilities and should take care not to display
images or play sounds that could create an atmosphere of harassment for others. Similar
considerations apply to electronic mail exchanges.

Electronic mail on Webster systems should be as private as the system administrators
can make it. Users are prohibited from trying to read the electronic mail of others.
System administrators are not to read mail or non-world-readable files unless truly
required in the course of their duties. System administrators are to treat mail and
non-world-readable files as private at all times. Whenever feasible, systems should
be administered so that bounced mail is directed to the system administrators in the
form of headers only to protect privacy while ensuring reliable e-mail service.

The University is not responsible for unofficial uses of computer resources. In particular,
e-mail and personal Web pages often express private opinions which do not reflect
University positions.

Property

Webster University computing and information resources are made available to individuals
to assist in the pursuit of educational and other academic goals. It is expected that
users will cooperate with each other and respect the ownership of work and information
even though it is in electronic--rather than more immediately tangible--form. Individuals
and organizations will be held no less accountable for their actions in situations
involving computers and information resources than they would be in dealing with other
media. Rules prohibiting theft and vandalism apply to software and data as well as
to physical equipment.

In particular:

No Webster system is to be used as a staging ground to crack other systems.

No one shall alter or delete software, hardware, communications, or data belonging
to someone else without authorization.

Users may not browse, access, copy, or change private files without authorization.
Users may not attempt to modify the computer system or software in any unauthorized
manner.

Use of Webster systems for non-Webster purposes, such as running an independent business,
or volunteer work for some other organization, absent written authorization, may constitute
theft of computer time. Activities by students related to their coursework or to the
work of chartered student organizations, and by faculty or staff related to their
contractual obligations are explicitly authorized by this policy.

Users ought to adhere to posted lab and system policies, procedures, or protocols,
such as time or storage limits, where those policies, procedures, or protocols are
consistent with this policy. Refusal may constitute failure to comply as defined in
the Code of Student Conduct.

The use of invasive software, such as "worms" and "viruses" destructive to computer
systems, is unethical and illegal.

Copyrighted software must only be used in accordance with its license or purchase
agreement. Users do not have the right to receive or use unauthorized copies of software,
nor to make unauthorized copies for themselves or others.

Gratuitous consumption of system resources (disk space, CPU time, bandwidth) will
not be tolerated.

Adjudication

This policy establishes no new governance or disciplinary structures. Alleged violations
of this policy are to be treated like other allegations of wrongdoing at the University.
For example, allegations of misconduct by students should be adjudicated according
to established procedures regarding student conduct.

Above policy approved in this form by the Faculty Senate, Webster University, July
18, 1996, and by the Technology Coordinating Committee, August 21, 1996, following
previous deliberations by the Senate, as well as deliberations by the Technology Coordinating
Committee of the University, its AUP Subcommitte, and the Faculty Executive Committee
(precursor to the Senate). Adopted by the Administrative Council of the University
on August 27, 1996.

The Law on Software Copyright When you buy software, you do not own the software, only the right to use it. If you purchase one copy, it is only legal for you to install and use one copy on one machine. Multiple installations from the same disk(s) are illegal unless you have purchased a multiple-user license.

Illegal use of software puts the university at risk for fines, lawsuits, loss of access
to educational software pricing, and represents unethical conduct that harms the entire
academic community.

"Fair Use" Laws Do Not Apply to SoftwareUniversities are subject to the same software copyright laws as corporations and individuals.
Just as it is wrong to buy one textbook and copy the entire text for many students
or faculty, it is wrong for a school to duplicate software without authority from
the publisher. This means that:

Departments may not use one set of disks to install software on several computers
unless a multiple-user license is purchased. This includes placing software or installers
on a networked server for many users to share.

Faculty and staff may not install University-owned software on their home computers
unless an individual copy is purchased by the University for that purpose. (In other
words, they may not use the same disks to install software on their office and home
computers.) This includes desktop and laptop computers obtained through the faculty/staff
purchase program!

Students and faculty cannot "borrow" or "rent" software for any purpose, including
educational use. A licensed copy must be purchased for each individual. Nearly every
software manufacturer offers heavily discounted pricing on software for educators
and students, in order to discourage software piracy in schools. Multiple licenses
and "lab packs" are also heavily discounted for use by an entire class.

What Software Is Copyrighted?

All software is copyrighted, even personal works by individuals, and no software may
be duplicated or distributed without the permission of the author. Obviously, this
includes major applications like Microsoft Word, Powerpoint, QuarkXPress or WordPerfect.
But it also includes utilities like Norton Anti-Virus, fonts, clip art, and the operating
system of your computer (Windows 95 or Mac OS). You cannot install, upgrade, copy
or distribute these items without owning a proper license to do so.

Work produced by students and faculty is equally protected by copyright law, and may not be copied or distributed without
the permission of the author.

Shareware is user-supported software that is distributed by the author, but it is not free. Authors generally request that you evaluate the software for a short time, then
either pay for the software or delete it. By honoring the author's license agreement,
you support the development of invaluable tools and the availability of low-cost software.
Freeware is software that has been committed to the public domain by the author, and can be
copied and distributed without charge.

Software Copyright at Webster UniversityTo determine if Webster University owns licenses of a particular software program
that can be installed on your office computer, call the Information Technology Helpdesk
at x5995.

The Consequences of Software PiracyUnauthorized duplication or distribution of software is a federal crime. It can carry
a penalty of fines up to $250,000 or jail terms up to five years. Universities and
corporations that have been caught pirating software have had to pay hundreds of thousands
of dollars in fines in addition to the cost of legalizing all their software and holding
anti-piracy training for their employees. Universities may also lose their right to
buy software at educational discounts, thereby curtailing the software resources they
can offer students and faculty.

Webster University has been audited once by Quark, the maker of QuarkXPress, a popular
desktop publishing package. Microsoft Corporation also audits its licensees at random.
If licensees cannot immediately produce original installation disks for all copies
of the software in use, they must face severe penalties and fines to avoid a lawsuit.

Why Legalize?When you purchase and register your software with the publisher, you receive user
guides and tutorials, quick reference cards, and the opportunity to purchase discounted
upgrades. Also, the copyright law promotes broad public availability of new, creative,
and innovative products. Without this protection, software publishers could not afford
to develop the valuable programs that have become so important in education, business,
and our daily lives.

You also protect the University from legal liability for copyright violations, and
preserve our access to educational discounts on software that allow us to provide
the most software resources to students and faculty.

Most importantly, software piracy harms the entire academic community. Respect for
intellectual labor and creativity is vital to academic discourse and enterprise. Just
as the University does not tolerate plagiarism, it does not condone the unauthorized
copying of software.